The present disclosure is directed to methods and apparatus that manage the flow of traffic. Methods and systems consistent with the present disclosure may allow biometric information of individuals to be collected when access privileges associated with particular individuals are validated or updated. These methods may allow a supervisor to temporarily or permanently authorize certain employees to access components that are located within a traffic control cabinet and these methods may allow changes in traffic signal light timing to be authorized according to a set of rules. Such authorization rules may require proposed signal light timing changes to be approved by a supervisor before a proposed change is implemented. Methods and systems consistent with the present disclosure may also cause components within a control cabinet to be disabled or disconnected when a signal light control cabinet is accessed by unauthorized persons.
|
1. A method of modifying a configuration at a traffic signal controller, the method comprising:
storing biometric data in a database specific to each of a plurality of persons, wherein each person is further associated with a different authorization privilege;
receiving biometric data of a person;
comparing the received biometric data of the person with the stored biometric information in the database to identify the person;
identifying an authorization privilege associated with the identified person in the database based on the received biometric information matching the stored biometric information for the person;
allowing the identified person to update the configuration at the traffic signal controller according to the authorization privilege;
querying a maintenance database to check if modifying the configuration at the traffic signal controller is scheduled to be performed; and
sending a notification if the modification is not scheduled.
10. A non-transitory computer-readable storage medium having embodied thereon a program executable by a processor to perform a method for modifying a configuration at a traffic signal controller, the method comprising:
storing biometric data in a database specific to each of a plurality of persons, wherein each person is further associated with a different authorization privilege;
receiving biometric data of a person;
comparing the received biometric data of the person with the stored biometric information in the database to identify the person;
identifying an authorization privilege associated with the identified person in the database based on the received biometric information matching the stored biometric information for the person;
allowing the identified person to update the configuration at the traffic signal controller according to the authorization privilege;
querying a maintenance database to check if modifying the configuration at the traffic signal controller is scheduled to be performed; and
sending a notification if the modification is not scheduled.
19. A system for modifying a configuration at a traffic signal controller, the system comprising:
a database in memory that stores biometric data specific to each of a plurality of persons, wherein each person is further associated with a different authorization privilege;
a biometric sensor that receives biometric data of a person; and
a processor that executes instructions stored in memory, wherein execution of the instructions by the processor:
compares the received biometric data of the person with the stored biometric information in the database to identify the person;
identifies an authorization privilege associated with the identified person in the database based on the received biometric information matching the stored biometric information for the person;
allows the identified person to update the configuration at the traffic signal controller according to the authorization privilege;
queries a maintenance database to check if modifying the configuration at the traffic signal controller is scheduled to be performed; and
sends a notification if the modification is not scheduled.
2. The method of
identifying that the authorization privilege indicates that the person is currently classified as unauthorized;
sending a message to a computing device associated with a supervising authority; and
receiving an instruction from the computing device associated with the supervising authority that changes the unauthorized classification of the person to an authorized classification, wherein the person is allowed to update the configuration according to the received instruction.
3. The method of
4. The method of
5. The method of
6. The method of
sending information to a supervising authority computing device that identifies the updated configuration; and
receiving an instruction from the supervising authority that approves the updated configuration, wherein the updated configuration is initiated based on the approval.
7. The method of
8. The method of
9. The method of
11. The non-transitory computer-readable storage medium of
identify that the authorization privilege indicates that the person is currently classified as unauthorized;
send a message to a computing device associated with a supervising authority; and
receive an instruction from the computing device associated with the supervising authority that changes the unauthorized classification of the person to an authorized classification, wherein the person is allowed to update the configuration according to the received instruction.
12. The non-transitory computer-readable storage medium of
13. The non-transitory computer-readable storage medium of
14. The non-transitory computer-readable storage medium of
15. The non-transitory computer-readable storage medium of
send information to a supervising authority computing device that identifies the updated configuration; and
receive an instruction from the supervising authority that approves the updated configuration, wherein the updated configuration is initiated based on the approval.
16. The non-transitory computer-readable storage medium of
17. The non-transitory computer-readable storage medium of
18. The non-transitory computer-readable storage medium of
20. The system of
|
The present application claims priority benefit of U.S. provisional patent application No. 62/664,002 filed Apr. 27, 2018 the disclosure of which is incorporated by reference.
The present disclosure generally relates to a traffic signal control system. More specifically the present disclosure is directed to systems and methods for modifying operational settings of a traffic control cabinet and its components.
Traffic signals are used to control and guide movement of traffic. Traffic signals are generally installed at intersections of roads and pedestrian crosswalks. Timings of the traffic signals may be programmed based on the volume of traffic expected to cross the intersection and traffic signal timing may be changed as the volume of traffic passing through the intersection changes over time. In peak commute hours, high traffic volumes may lead to traffic congestion and delayed transit times. Optimally, the timing of the traffic signals may be adjusted dynamically to control the traffic at different times. Generally, authorized traffic personnel may set the timing schedule on a traffic signal controller located within a traffic control cabinet or modify or repair other components of the traffic control system located inside the traffic control cabinet.
Access to traffic control cabinets are generally secured using a lock that can only be opened by authorized personnel. Typically, a physical key must be used to open traffic signal control cabinet locks. In certain instances, however, a situation may arise that requires currently unauthorized personnel to access to a traffic signal control cabinet such that a repair or update may be quickly performed. For example, in an instance when a failure in a traffic controller must be repaired at a time when experienced repair technicians are not available, another more junior technician may have to be allowed access to the failing traffic controller such that the repair can be expedited. This more junior technician, however, may not have access to a physical key that may be required to access components that are located within a traffic control cabinet.
What are needed are systems and methods that allow individuals to gain access to traffic control cabinets in new ways. What are needed are systems and methods where the status of personnel may be updated dynamically in a manner that allows currently unauthorized personnel to access traffic control cabinets when a need arises. Such situations may require that a status assigned to a junior technician be updated to an authorized status when there is an urgent need to repair a traffic control signal controller. Such situations may also require an automated system that allows personnel to access traffic control cabinets even when physical keys are not accessible.
While, allowing a junior employee to access traffic control signal cabinets may provide benefits, such actions come with a risk that the junior employee may inadvertently make changes that cause unintentional traffic disruptions. Furthermore, even more experienced employees may make changes to traffic timing parameters that negatively impact traffic flow. As such, there is also a need for intelligent systems that quickly identify when updates to traffic signal timing result in increased traffic congestion such that corrections can be made to mitigate the effects of human error such that traffic congestion can be minimized.
The presently claimed invention relates to a method, a non-transitory computer-readable storage medium, and a system that allows configurations at a traffic signal light controller to be updated. A method consistent with the presently claimed invention may include receiving personal biometric data, comparing the received biometric data with information stored in a database, and identifying an authorization privilege of a person based on information retrieved from a database that cross-references the retrieved database information with the personal biometric data. The method of the presently claimed invention may also allow the person to update a configuration at the traffic signal light controller according to the authorization privilege.
When the presently claimed invention is implemented as a non-transitory computer readable storage medium, a process executing instructions out of a memory may implement a method consistent with the present disclosure. Here again the method may include receiving personal biometric data, comparing the received biometric data with information stored in a database, identifying an authorization privilege of a person based on information retrieved from a database that cross-references the retrieved database information with the personal biometric data, and allowing the person to update a configuration at the traffic signal light controller according to the authorization privilege.
A system consistent with the presently claimed invention may include a traffic signal light controller and a computer that are communicatively coupled to each other. The traffic signal light controller may receive personal biometric data and may send that personal biometric data to the computer. After the computer receives the personal biometric data, the computer may compare that biometric data with information stored in a database after which the computer may identify an authorization privilege associated with a person. The computer may then allow an updated configuration to be initiated according to the authorization privilege based on information that cross-references the received biometric information with the authorization privilege.
The present disclosure is directed to methods and apparatus that manage the flow of traffic. Methods and systems consistent with the present disclosure may allow biometric information of individuals to be collected when access privileges associated with particular individuals are validated or updated. These methods may allow a supervisor to temporarily or permanently authorize certain employees to access components that are located within a traffic control cabinet and these methods may allow changes in traffic signal light timing to be authorized according to a set of rules. Such authorization rules may require proposed signal light timing changes to be approved by a supervisor before a proposed change is implemented. Methods and systems consistent with the present disclosure may also cause components within a control cabinet to be disabled or disconnected when a signal light control cabinet is accessed by unauthorized persons.
System 100 may implement a method that modifies operational settings of traffic controller 120. These operational settings may control the timing and sequences of a traffic signal controlled by traffic controller 120. In operation, computer 110 may communicate with temporary change database 150 to access or update temporary modifications to the operational settings of traffic controller 120. Temporary change database 150 may be updated to store a change that gives priority to a particular direction of travel. For example, when the President of the USA visits a city, the movement of the Presidential motorcade may be given priority after an operator configures and stores updates to temporary change database 150. Updates to the temporary change database 150 may be made via administrative terminal 180 after user credentials of the operator have been authenticated. A method for authenticating the operator may include the operator providing a biometric input via administrative terminal 180, this method may include a computer accessing biometric database 140 when that computer authenticates the identity of the operator.
When programming updates to temporary change database 150, the operator may enter new settings that result in signal lights in a particular direction to turn green to allow for the President's motorcade to move through a city without stopping. After a certain time or after the President's motorcade has passed through portions of the city, traffic signal timings may revert back to normal settings. In certain instances, temporary change database 150 may store temporary adjustments to traffic timing over any time span. For example, the timing of traffic signals proceeding to or departing from Super Bowl Stadium may be programmed months in advance. This programming may allow traffic flowing toward the stadium to encounter fewer red lights before the game and may allow traffic flowing away from the stadium to encounter fewer red lights after the game ends.
The scheduled maintained database 160 may store information that identifies dates when certain types of maintenance should be performed to a traffic control system. The maintenance schedule database 160 may be programmed with dates when preventative maintenance checks or other preventative measures should be performed. Alternatively or additionally, maintenance schedule database 160 may be updated when a fault is detected or after maintenance personnel enters information into maintenance database 160. In an example, maintenance database 160 may be updated automatically after a camera captures an image of a particular signal when that particular signal fails to illuminate properly. A user device belonging to a maintenance technician may be sent a message that instructs the technician to repair the failing signal immediately after computer 110 receives the captured image and identifies that the signal has failed to illuminate properly. For example, when signal state information equals “RED” and when the captured image does not include a red indicator at the signal being illuminated, the failure of the red indicator at the signal may be automatically identified by computer 110.
Communication network 130 may also be communicatively coupled to cloud-based network 170. In certain instances, methods and apparatus consistent with the present disclosure may be implemented in the cloud-based network 170. For example, any or all of the databases illustrated in
Communication network 130 may be a wired and/or a wireless network. Exemplary wireless network include, yet are not limited to networks that use visible light communications (VLC), worldwide interoperability for microwave access (WiMAX), long term evolution (LTE), wireless local area network (WLAN), infrared (IR), public switched telephone network (PSTN), radio waves, or other wireless communication technologies known in the art.
Program code of base module 250 may be executed by processor 210, when processor 210 communicates with traffic signal controller 120 of
Interface 220 may be a user interface or communication interface that allows information to be received from an operator. Interface 220 may receive modifications to operational settings of a traffic cabinet. Interface 220 may accept inputs from authorized operators or may provide information to authorized operators. Interface 210 may receive commands via a command line interface (CLI), a graphical user interface (GUI), or via a voice interface. When voice data is received via interface 220, processor 210 may execute instructions out of memory 240 when identifying commands spoken by an authorized operator.
Memory 240 may include or be comprised of one or more types of memory, such as hard disk drives, FLASH memory, magnetic tape, floppy diskettes, optical disks, compact disks, read-only memory (ROM/CD-ROM), magneto-optical disks, semiconductor memories, random access memory (RAM), Programmable Read-Only Memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), magnetic cards, optical cards, or other type of machine-readable medium suitable for storing instructions executable by a processor.
A processor executing instructions out of a memory may access data stored in table 300 when the identity of an employee is authenticated. This authentication process may include receiving a biometric, receiving employee an identification (ID) number, accessing biometric information associated with the received employee ID number, and may include matching the received biometric with biometric data (face image or fingerprint) stored in table 300. When information stored in table 300 matches information provided by an employee, that employee may be allowed to change settings or to update maintenance information according to access privileges associated with that employees job function. For example, Elena and Thomas may be allowed to make entries into a maintenance database, yet may not be authorized to change signal timing based on rules that allows technicians to update the maintenance database and that do not allow technicians to change signal timing. In another example, Michael Jane may be allowed to enter updates into the maintenance database and Michael may be allowed to change signal timing based on one or more rules that allow administrators to update the maintenance database and to make changes to signal timing.
The scheduled maintenance database 112 of
In certain instances, each maintenance task in table 400 may be assigned a unique maintenance task ID. Such maintenance task IDs may be automatically generated when new maintenance task information is entered by an administrator. For example, an administrator may schedule employee 146 to repair traffic signal A987 on Apr. 13, 2017 and the administrator may also enter an estimated start and end time for that particular maintenance task to be performed. As soon as the administrator begins entering information relating to the repair of traffic signal A987, this new task may be automatically assigned maintenance task ID number 2, for example.
As mentioned above, the pending status may indicate that a particular change is awaiting approval by authorized personnel. Alternatively, this pending status may be used to indicate that changes to particular signal light timings were attempted without a successful authentication process having been completed. In an instance when an expiration date is encountered when an approval status is still pending, any changes included in a respective change file may be classified as an unauthorized change. As such, entries in a temporary changes database may be used to identify change requests that were not accepted by authorized employees of an organization chartered with administrating changes to traffic signal light timing.
After the access attempt is detected in step 605, biometric sensor data may be received in step 610 of
When determination step 620 identifies that the received biometric does not belong to an operator that is authorized to change received settings to the approved state, program flow may move to step 630 where a maintenance schedule may be accessed. Step 630 may query a schedule maintenance database to identify whether a maintenance event has been scheduled for a particular traffic signal controller. Then, in step 635 of
After step 635, a processor may store any received any received changes, setting updates, or change data files in step 640. Next, determination step 645 may identify whether the changes stored in step 640 have been approved by the administrator or other authorized entities, when yes, program flow may move to step 625 where the approved changes are implemented. When determination step 645 identifies that the stored changes have not been approved, program flow may move to step 650 where any unapproved changes may be purged or deleted. Alternatively, unapproved changes may be associated with an unauthorized status without deleting the unapproved changes from memory. Next, program flow may end at step 655 of
Next, in step 730, of
After an authentication has been performed a user may enter information or settings via user interface 860 or via a keyboard not illustrated in
In certain instances, traffic control boxes/cabinets associated with certain traffic signals may adjust their own timing according to data files and algorithms as traffic conditions change. In such instances, a central control system may not command changes to respective individual signal light controllers, yet the central control system may provide data regarding traffic flow at other signal lights. Alternatively, respective traffic signal light controllers may communicate with each other as peers in a peer-to-peer computing environment where different signal light controllers communicate traffic flow data to other signal light controllers along particular roadways. As such, method and systems consistent with the present disclosure may be controlled in part by a central control system or may operate more independently using information received from a central control system or from other signal light controllers.
The components shown in
Mass storage device 1030, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 1010. Mass storage device 1030 can store the system software for implementing embodiments of the present invention for purposes of loading that software into main memory 1020.
Portable storage device 1040 operates in conjunction with a portable non-volatile storage medium, such as a FLASH memory, compact disk or Digital video disc, to input and output data and code to and from the computer system 1000 of
Input devices 1060 provide a portion of a user interface. Input devices 1060 may include an alpha-numeric keypad, such as a keyboard, for inputting alpha-numeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the system 1000 as shown in
Display system 1070 may include a liquid crystal display (LCD), a plasma display, an organic light-emitting diode (OLED) display, an electronic ink display, a projector-based display, a holographic display, or another suitable display device. Display system 1070 receives textual and graphical information, and processes the information for output to the display device. The display system 1070 may include multiple-touch touchscreen input capabilities, such as capacitive touch detection, resistive touch detection, surface acoustic wave touch detection, or infrared touch detection. Such touchscreen input capabilities may or may not allow for variable pressure or force detection.
Peripherals 1080 may include any type of computer support device to add additional functionality to the computer system. For example, peripheral device(s) 1080 may include a modem or a router.
Network interface 1095 may include any form of computer interface of a computer, whether that be a wired network or a wireless interface. As such, network interface 1095 may be an Ethernet network interface, a BlueTooth™ wireless interface, an 802.11 interface, or a cellular phone interface.
The components contained in the computer system 1000 of
The present invention may be implemented in an application that may be operable using a variety of devices. Non-transitory computer-readable storage media refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile and volatile media such as optical or magnetic disks and dynamic memory, respectively. Common forms of non-transitory computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, RAM, PROM, EPROM, a FLASH EPROM, and any other memory chip or cartridge.
Some embodiments of this disclosure, illustrating all its features. The words “comprising,” “having,” “containing,” and “including,” and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items.
It must also be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise. Although any systems and methods similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present disclosure, the preferred, systems and methods are now described.
Embodiments of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings in which like numerals represent like elements throughout the several figures, and in which example embodiments are shown. Embodiments of the claims may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. The examples set forth herein are non-limiting examples and are merely examples among other possible examples.
While various flow diagrams provided and described above may show a particular order of operations performed by certain embodiments of the invention, it should be understood that such order is exemplary (e.g., alternative embodiments can perform the operations in a different order, combine certain operations, overlap certain operations, etc.). The accompanying drawings illustrate various embodiments of systems, methods, and embodiments of various other aspects of the disclosure. Any person with ordinary skills in the art will appreciate that the illustrated element boundaries (e.g. boxes, groups of boxes, or other shapes) in the figures represent one example of the boundaries. It may be that in some examples one element may be designed as multiple elements or that multiple elements may be designed as one element. In some examples, an element shown as an internal component of one element may be implemented as an external component in another, and vice versa. Furthermore, elements may not be drawn to scale. Non-limiting and non-exhaustive descriptions are described with reference to the following drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating principles.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
8370639, | Jun 16 2005 | SENSIBLE VISION, INC | System and method for providing secure access to an electronic device using continuous facial biometrics |
9442446, | Aug 29 2014 | KYOCERA Document Solutions Inc. | Image forming apparatus having a user authentication operation and power state that are controlled depending on alarm level of disaster information |
20050216748, | |||
20100111377, | |||
20100171640, | |||
20100225441, | |||
20120112928, | |||
20130285840, | |||
20150278499, | |||
20170006044, | |||
20190334922, | |||
KR20140122101, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 25 2019 | Cubic Corporation | (assignment on the face of the patent) | / | |||
May 13 2019 | OVERSTREET, WILLIAM S | GRIDSMART TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049316 | /0081 | |
Jun 06 2019 | GRIDSMART TECHNOLOGIES, INC | Cubic Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049476 | /0829 | |
May 25 2021 | Cubic Corporation | BARCLAYS BANK PLC | FIRST LIEN SECURITY AGREEMENT | 056393 | /0281 | |
May 25 2021 | PIXIA CORP | BARCLAYS BANK PLC | FIRST LIEN SECURITY AGREEMENT | 056393 | /0281 | |
May 25 2021 | Nuvotronics, Inc | BARCLAYS BANK PLC | FIRST LIEN SECURITY AGREEMENT | 056393 | /0281 | |
May 25 2021 | Cubic Corporation | ALTER DOMUS US LLC | SECOND LIEN SECURITY AGREEMENT | 056393 | /0314 | |
May 25 2021 | PIXIA CORP | ALTER DOMUS US LLC | SECOND LIEN SECURITY AGREEMENT | 056393 | /0314 | |
May 25 2021 | Nuvotronics, Inc | ALTER DOMUS US LLC | SECOND LIEN SECURITY AGREEMENT | 056393 | /0314 |
Date | Maintenance Fee Events |
Apr 25 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
May 07 2019 | SMAL: Entity status set to Small. |
Aug 01 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Nov 30 2024 | 4 years fee payment window open |
May 30 2025 | 6 months grace period start (w surcharge) |
Nov 30 2025 | patent expiry (for year 4) |
Nov 30 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 30 2028 | 8 years fee payment window open |
May 30 2029 | 6 months grace period start (w surcharge) |
Nov 30 2029 | patent expiry (for year 8) |
Nov 30 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 30 2032 | 12 years fee payment window open |
May 30 2033 | 6 months grace period start (w surcharge) |
Nov 30 2033 | patent expiry (for year 12) |
Nov 30 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |